The Bacon Cipher Explained
#cryptology, #cryptography, #cryptanalysis
In this video, we explain the Bacon cipher, which was invented by Sir Francis Bacon. We also show how to "encrypt/decrypt" using it in CrypTool 2. Actually, the Bacon cipher is a steganography method and not a cipher, so speaking of encryption is not correct. Regardless, it is always referred to as a "cipher".
Original publication containing the Bacon cipher: https://www.biodiversitylibrary.org/item/86617#page/384/mode/1up
I also wrote a small article about the Bacon cipher on my blog: https://www.kopaldev.de/2022/09/07/the-bacon-cipher-explained/
If you are interested in learning the fundaments of cryptology, let me invite you to have a look at our video series about the basics of cryptology, also for beginners: https://youtu.be/jbumW7Ym03o
You can download the latest version of CrypTool 2 from here: https://www.cryptool.org/en/ct2/downloads
Visit my blog: https://www.kopaldev.de
Видео The Bacon Cipher Explained канала Cryptography for Everybody
In this video, we explain the Bacon cipher, which was invented by Sir Francis Bacon. We also show how to "encrypt/decrypt" using it in CrypTool 2. Actually, the Bacon cipher is a steganography method and not a cipher, so speaking of encryption is not correct. Regardless, it is always referred to as a "cipher".
Original publication containing the Bacon cipher: https://www.biodiversitylibrary.org/item/86617#page/384/mode/1up
I also wrote a small article about the Bacon cipher on my blog: https://www.kopaldev.de/2022/09/07/the-bacon-cipher-explained/
If you are interested in learning the fundaments of cryptology, let me invite you to have a look at our video series about the basics of cryptology, also for beginners: https://youtu.be/jbumW7Ym03o
You can download the latest version of CrypTool 2 from here: https://www.cryptool.org/en/ct2/downloads
Visit my blog: https://www.kopaldev.de
Видео The Bacon Cipher Explained канала Cryptography for Everybody
Показать
Комментарии отсутствуют
Информация о видео
6 сентября 2022 г. 16:04:34
00:15:56
Другие видео канала
![Zodiac Killer Ciphers – Let's have a Look at Unicity Distances With Excel](https://i.ytimg.com/vi/OXMalTqLLNw/default.jpg)
![10 - Automatic Translation of CrypTool 2 To a New Language](https://i.ytimg.com/vi/10bX5N6epQI/default.jpg)
![04 - Internationalization of the Component (CrypTool 2 Development Series)](https://i.ytimg.com/vi/j1fQh5mkaa0/default.jpg)
![My Cryptologic Highlights of 2020](https://i.ytimg.com/vi/RqDoUxn0iSg/default.jpg)
![Crypto Challenge Contest – Video 1](https://i.ytimg.com/vi/CnkCFSrEr_4/default.jpg)
![Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)](https://i.ytimg.com/vi/X9ujhcmGgqk/default.jpg)
![Enigma Machine – Part 1 of 2 – How does it work?](https://i.ytimg.com/vi/FG59my_HLtI/default.jpg)
![Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models)](https://i.ytimg.com/vi/19_6qWYPo8I/default.jpg)
![Digital File Signatures – How Do They Protect Your Computer?](https://i.ytimg.com/vi/lvPfXie_K-Q/default.jpg)
![What is New in the CrypTool 2 Release 2020.1?](https://i.ytimg.com/vi/lap3dBtG0TU/default.jpg)
![Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)](https://i.ytimg.com/vi/2A1tZIg6Cts/default.jpg)
![Let's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a Scandal](https://i.ytimg.com/vi/P0katKMm_mg/default.jpg)
![Basics of Cryptology – Part 9 (Modern Cryptography – Block Ciphers – Feistel Ciphers & SDES)](https://i.ytimg.com/vi/wVm7mANbdgw/default.jpg)
![The Straddling Checkerboard Cipher Explained](https://i.ytimg.com/vi/q8CByEr2VwE/default.jpg)
![Let's Decipher Two Encrypted English Postcards – Secret Messages From the Past Revealed](https://i.ytimg.com/vi/SfH9Rs-phP0/default.jpg)
![Let's Break My Self-Made Cryptographic Challenges From HistoCrypt 2019](https://i.ytimg.com/vi/PArQj_nVCGs/default.jpg)
![Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)](https://i.ytimg.com/vi/V28o6Rsh9JU/default.jpg)
![Break an Encrypted Letter of a Child Killer](https://i.ytimg.com/vi/J8tiCt7tAYo/default.jpg)
![Basics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)](https://i.ytimg.com/vi/1CKillJcNzI/default.jpg)
![An Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy Book](https://i.ytimg.com/vi/IDT6yUd68G8/default.jpg)
![Let's Program a Hash Preimage Searcher to Break Passwords](https://i.ytimg.com/vi/MQc5j7tJSBI/default.jpg)